Skip to main content

WIRELESS SENSOR NETWORKS FOR SECURITY: ISSUES AND CHALLENGES

  • Conference paper
Advances in Sensing with Security Applications

Part of the book series: NATO Security Through Science Series ((NASTA,volume 2))

Abstract

In this chapter, the sensing coverage area of surveillance wireless sensor networks is considered. The sensing coverage is determined by applying Neyman-Pearson detection and de.ning the breach probability on a grid-modeled field. Using a graph model for the perimeter, Dijkstra’s shortest path algorithm is used to find the weakest breach path. The breach probability is linked to parameters such as the false alarm rate, size of the data record and the signal-to-noise ratio. Consequently, the required number of sensor nodes and the surveillance performance of the network are determined. For target tracking applications, small wireless sensors provide accurate information since they can be deployed and operated near the phenomenon. These sensing devices have the opportunity of collaboration amongst themselves to improve the target localization and tracking accuracies. Distributed data fusion architecture provides a collaborative tracking framework. Due to the present energy constraints of these small sensing and wireless communicating devices, a common trend is to put some of them into a dormant state. We adopt a mutual information based metric to select the most informative subset of the sensors to achieve reduction in the energy consumption, while preserving the desired accuracies of the target position estimation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. S. Appadwedula, V. V. Veeravalli, and D. L. Jones, “Robust and locally optimum decentralized detection with censoring sensors”, in Proceedings of the International Conference on Information Fusion, Annapolis, USA, July 2002, pp. 56–63.

    Google Scholar 

  2. Y. Bar-Shalom, X. R. Li, and T. Kirubarajan, Estimation with Applications to Tracking and Navigation, Wiley, 2001.

    Google Scholar 

  3. M. S. Bazaraa and J. J. Jarvis Linear Programming and Network Flows, Wiley, 1977.

    Google Scholar 

  4. R. Bejar, B. Krishnamachari, C. Gomes, and B. Selman, “Distributed constraint satisfaction in a wireless sensor tracking system”, in Proceedings of the Workshop on Distributed Constraint Reasoning, International Joint Conference on Artificial Intelligence, Seattle, USA, August 2001.

    Google Scholar 

  5. R. R. Brooks, P. Ramanathan, and A. Sayeed, “Distributed target tracking and classification in sensor network”, Proceedings of the IEEE, Vol. 91, No. 8, pp. 1163–1171, August 2003.

    Article  Google Scholar 

  6. R. R. Brooks and C. Griffin, “Traffic model evaluation of ad hoc target tracking algorithms”, International Journal of High Performance Computing Applications, Vol. 16, No. 3, pp. 221–234, August 2002.

    Google Scholar 

  7. R. R. Brooks, C. Griffin, and D. S. Friedlander, “Self-organized distributed sensor network entity tracking”, International Journal of High Performance Computing Applications, Vol. 16, No. 3, pp. 207–219, August 2002.

    Google Scholar 

  8. J. Carle and D. Simplot-Ryl, “Energy-efficient area monitoring for sensor networks”, IEEE Computer, Vol. 37, No. 2, pp. 40–46, February 2004.

    Google Scholar 

  9. M. Chu, H. Haussecker, and F. Zhao, ”Scalable information-driven sensor querying and routing for ad hoc heterogenous sensor networks,” International Journal of High Performance Computing Applications, Vol. 16, No. 3, pp. 293–313, August 2002.

    Article  Google Scholar 

  10. V. Chvatal, “A combinatorial theorem in plane geometry,” Journal of Combinatorial Theory, Vol. B, No. 13, pp. 39–41, 1975.

    Google Scholar 

  11. T. Clouqueur, V. Phipatanasuphorn, P. Ramanathan and K. K. Saluja, “Sensor deployment strategy for detection of targets traversing a region,” Mobile Networks and Applications, Vol. 8, No. 4, pp. 453–461, August 2003.

    Article  Google Scholar 

  12. S. S. Dhillon and K. Chakrabarty, “Sensor placement for effective coverage and surveillance in distributed sensor networks,” in Proceedings of the IEEE Wireless Communications and Networking Conference, New Orleans, USA, March 2003, pp. 1609–1614.

    Google Scholar 

  13. A. Elfes “Occupancy grids: a stochastic spatial representation for active robot perception,” in Autonomous Mobile Robots: Perception, Mapping and Navigation, Vol. 1, S. S. Iyengar and A. Elfes Editors, IEEE Computer Society Press, 1991, pp. 60–70.

    Google Scholar 

  14. E. Ertin, J. W. Fisher, and L. C. Potter, “Maximum mutual information principle for dynamic sensor query problems”, in Proceedings of the 2nd International Workshop on Information Processing in Sensor Networks, Palo Alto, USA, April 2003, pp. 405–416.

    Google Scholar 

  15. Q. Fang, F. Zhao, and L. Guibas, “Counting targets: Building and managing aggregates in wireless sensor networks”, Palo Alto Research Center (PARC), Tech. Rep. P2002–10298, June 2002.

    Google Scholar 

  16. B. Grocholsky, A. Makarenko, and H. Durrant-Whyte, “Information-theoretic coordinated control of multiple sensor platforms,” in Proceedings of the IEEE International Conference on Robotics and Automation, Taipei, Taiwan, September 2003, pp. 1521–1526.

    Google Scholar 

  17. R. Jiang and B. Chen, “Decision fusion with censored sensors”, Proceedings of ICASSP, Vol. 2, Montreal, Canada, May 2004, pp. 289–292.

    Google Scholar 

  18. T. He, S. Krishnamurthy, J. A. Stankovic, T. Abdelzaher, L. Luo, R. Stoleru, T. Yan and L. Gu, “Energy-efficient surveillance system using wireless sensor networks,” Proceedings of the Second International Conference on Mobile Systems, Applications, and Services, Boston, USA, June 2004, pp. 270–283.

    Google Scholar 

  19. R. E. Kalman, “A new approach to linear filtering and prediction problems,” Transactions of the ASME-Journal of Basic Engineering, Vol. 82, pp. 35–45, 1960, series D.

    Google Scholar 

  20. D. Kazakos and P. Papantoni-Kazakos, Detection and Estimation, New York, USA: Computer Science Press, 1990.

    Google Scholar 

  21. D. Lerro and Y. Bar-Shalom, “Tracking with debiased consistent converted measurements versus EKF”, IEEE Transactions on Aerospace and Electronic Systems, Vol. 29, No. 3, pp. 1015–1022, July 1993.

    Google Scholar 

  22. D. Li, K. D. Wong, Y. Hu, and A. M. Sayeed, “Detection, classification, tracking of targets in micro-sensor networks”, IEEE Signal Processing Magazine, Vol. 19, No. 2, pp. 17–29, March 2002.

    Google Scholar 

  23. X.-Y. Lin, P.-J. Wan and O. Frieder, “Coverage in wireless ad hoc sensor networks,” IEEE Transactions on Computers, Vol. 52, No. 6, pp. 753–763, June 2003.

    Article  Google Scholar 

  24. J. Liu, P. Cheung, L. Guibas, and F. Zhao, “A dual-space approach to tracking and sensor management in wireless sensor networks”, in The First ACM International Workshop on Wireless Sensor Networks and Applications, Atlanta, USA, September 2002.

    Google Scholar 

  25. S. Megerian, F. Koushanfar, G. Qu, G. Veltri and M. Potkonjak, “Exposure in wireless sensor networks: theory and practical solutions,” Wireless Networks, Vol. 8, No. 5, pp. 443–454, September 2002.

    Article  Google Scholar 

  26. D. P. Mehta, M. A. Lopez and L. Lin, “Optimal coverage paths in ad-hoc sensor networks,” in Record of the IEEE International Conference on Communications, Anchorage, USA, May 2003, pp. 507–511.

    Google Scholar 

  27. J. Moore, T. Keiser, R. R. Brooks, S. Phoha, D. Friedlander, J. Koch, A. Reggio, and N. Jacobson, “Tracking targets with self-organizing distributed ground sensors”, in Proceedings of the IEEE Aerospace Conference, Vol. 5, Big Sky, USA, March 2003, pp. 2113–2123.

    Google Scholar 

  28. E. Onur, C. Ersoy and H. Deliç, “Quality of deployment in surveillance wireless sensor networks”, International Journal of Wireless Information Networks, Vol. 12, No. 1, pp. 61–67, January 2005.

    Article  Google Scholar 

  29. E. Onur, C. Ersoy and H. Deliç, “How many sensors for an acceptable breach probability level?”, Computer Communications, Special Issue on Dependable Sensor Networks, in press 2005.

    Google Scholar 

  30. E. Onur, C. Ersoy and H. Deliç, “Sensing coverage and breach paths in surveillance wireless sensor networks”, in Sensor Network Operations, S. Phoha, T. F. La Porta and C. Griffin, Editors, IEEE Press, 2005.

    Google Scholar 

  31. S. Pattern, S. Poduri and B. Krishnamacharie, “Energy-quality tradeoffs for target tracking in wireless sensor networks”, in Proceedings of Information Processing in Sensor Networks, Palo Alto, USA, April 2003, pp. 32–36.

    Google Scholar 

  32. N. Patwari and A. O. Hero, “Hierarchical censoring for distributed detection in wireless sensor networks”, Proceedings of IEEE ICASSP, Vol. 4, Hong Kong, April 2003, pp. 848–851.

    Google Scholar 

  33. C. Rago, P. Willett, and Y. Bar-Shalom, “Censoring sensors: A low communication-rate scheme for distributed detection”, IEEE Transactions on Aerospace and Electronic Systems, Vol. 32, No. 4, pp. 554–568, April 1996.

    Google Scholar 

  34. P. Ramanathan, “Location-centric approach for collaborative target detection, classification, and tracking”, in Proceedings of the IEEE CAS Workshop on Wireless Communications and Networking, Pasadena, USA, September 2002.

    Google Scholar 

  35. D. Tian and N. D. Georganas, “A coverage-preserving node scheduling scheme for large wireless sensor networks,” Proceedings of the First ACM International Workshop on Wireless Sensor Networks and Applications, Atlanta, USA, September 2002, pp. 32–41.

    Google Scholar 

  36. D. Tian and N. D. Georganas, “A node scheduling scheme for energy conservation in large wireless sensor networks”, Wireless Communications and Mobile Computing, Vol. 3, No. 2, pp. 271–290, May 2003.

    Article  Google Scholar 

  37. S. Tilak, N. B. Abu-Ghazaleh and W. Heinzelman, “Infrastructure tradeoffs for sensor networks,” Proceedings of the First ACM International Workshop on Wireless Sensor Networks and Applications, Atlanta, USA, September 2002, pp. 49–58.

    Google Scholar 

  38. H. Wang, K. Yao, G. Pottie, and D. Estrin, “Entropy-based sensor selection heuristic for target localization,” in Proceedings of the Third Symposium on Information Processing in Sensor Networks, Berkeley, USA, April 2004, pp. 36–45.

    Google Scholar 

  39. X. Wang, G. Xing, Y. Zhang, C. Lu, R. Pless and C. Gill, “Integrated coverage and connectivity configuration in wireless sensor networks,” in Proceedings of the First International ACM Conference on Embedded Networked Sensor Systems, Los Angeles, USA, November 2003, pp. 28–39.

    Google Scholar 

  40. M. A. Weiss, Data Structures and Algorithm Analysis in C++, 2nd Edition, Addison-Wesley, 1999.

    Google Scholar 

  41. T. Yan, T. He and J. A. Stankovic, “Differentiated surveillance for sensor networks,” SENSYS 2003.

    Google Scholar 

  42. F. Ye, G. Zhong, S. Lu and L. Zhang, “Peas: A robust energy conserving protocol for long-lived sensor networks,” Proceedings of the 23rd International Conference on Distributed Computing Systems, Providence, USA, May 2003, pp. 28–37.

    Google Scholar 

  43. H. Zhang and C.-J. Hou, “On deriving the upper bound of α-lifetime for large sensor networks,” Technical Report UIUCDCS-R-2004–1, University of Illinois at Urbana-Champaign, Department of Computer Science, February 2004.

    Google Scholar 

  44. F. Zhao, J. Shin and J. Reich, “Information-driven dynamic sensor collaboration for tracking application,” IEEE Signal Processing Magazine, Vol. 19, No. 1, pp. 61–72, March 2002.

    Google Scholar 

  45. Y. Zou and K. Chakrabarty, “Sensor deployment and target localization based on virtual forces,” Proceedings of the IEEE INFOCOM, San Francisco, USA, April 2003, pp. 1293–1303.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer

About this paper

Cite this paper

Onel, T., Onur, E., Ersoy, C., Delic, H. (2006). WIRELESS SENSOR NETWORKS FOR SECURITY: ISSUES AND CHALLENGES. In: Byrnes, J., Ostheimer, G. (eds) Advances in Sensing with Security Applications. NATO Security Through Science Series, vol 2. Springer, Dordrecht. https://doi.org/10.1007/1-4020-4295-7_05

Download citation

Publish with us

Policies and ethics